Rescue for Pine Grove: Data Recovery Resurrects a Library

by | Nov 16, 2015 | Uncategorized

On the morning of May 21, something happened. Suspicion fell first on kids playing with matches. But a Fire Department investigation soon revealed that it was faulty wiring in the walls that started the fire. The temporary building that permanently housed the Pine Grove Elementary School’s library in the town of Orcutt, California was no more. The formerly bright interior had taken on the cast of a coal mine.

Well before the investigation was concluded, community members and organizations donated thousands of dollars in cash and services to help rebuild. But there was a problem.

The building still stood, but its entire contents had been destroyed – books, shelves and desks turned to ash and embers. While the contents were insured, the data cache containing a listing of the contents was in a laptop on a burned desk in the building. The plastic of the laptop bore a strong resemblance to volcanic ejecta. There was no way to turn the computer on, and the backup for the data had been kept on a CD. The CD had been kept in the drawer of the desk on which the laptop sat. And the CD was now a puddle of melted plastic.

Fortunately, this is when Burgess Consulting & Forensics entered the scene. Using a mask and gloves, the first part of the project, after peeling the remains off the desk, was an archaeological expedition to the location of the hard disk inside the laptop. Knowing where was half the battle. A Dremel tool with various attachments allowed the excavation to proceed apace.

A careful cleaning of the outside of the drive allowed further inspection to proceed without contaminating the drive. Once the grit & smoke residue was removed, it became clear that several of the traces connecting the guts of the hard disk with the electronics outside the hard disk had burned through. These were repaired with small jumpers soldered onto the exposed traces of the membrane cable as it emerged from the hard disk’s insides.

The drive was opened in a clean room environment and miraculously, the smoke had stayed out of the enclosed portion of the drive. With delicate machinery, and clearances measured in microns, this was an important factor in the potential success of the recovery. Smoke particles can be larger than the clearance between read/write head and platters, making the process of reading the platters impossible.

The drive was attached to a write-blocker and every byte of the drive was transferred to another device. The partition structure was carefully rebuilt, and the file structure recovered. In the end, Burgess recovered all of the data – for free.

The school district’s alternative would have been to go through the costly process of examining decades of purchase orders and receipts in order to have even an estimate of the library’s charred inventory. But instead, a complete and up to date record could be presented to the insurance company.

And finally, the recovery was complete.

What is the moral of the story? There are two.

The first is about backups. Keep your backups current. And keep a copy off site.

The second is about community. Communities come together to make rebuilding from a disaster possible. Even with the resources of the school district, and funds from insurance, the reason the library could get back on its feet quickly, replacing its 8,000 book inventory and providing badly needed services to the children of Pine Grove once again was due to generous contributions of funds and services.

It took one fire to wreck a library, but it took one community to rebuild.

Subscribe to our free and informative weekly forensics newsletter!

 

Related Posts

Email spoofing, scamming, and hacking

Email spoofing, scamming, and hacking, Copyright 2024 by Steve Burgess Email domain spoofing scams With fortunes, privacy, and identity fraud at stake, we have had a number of cases involving phishing and spoofing in the past few years and into the present where...

AT&T Data Breach and Hack: What Does it Mean to Me?

AT&T Data Breach and Hack: What Does it Mean to Me? copyright 2024, Steven Burgess It was ginormous. It included almost all wireless customers from 2022. Did you have an AT&T phone or other account in 2022? You’re one of 110 million (gasp). You be hacked, my...

Somebody deleted stuff off my phone (I swear it wasn’t me!). Can I get it back?

- Copyright Steve Burgess 2024 Your phone is suddenly losing text, videos, photos. What’s happening? Are they gone forever? Have I been hacked? How do I avoid this in the future? What’s happening? Of course, it’s hard to tell without some history of the phone’s use,...

CSI Cases from Burgess Forensics #69 A Case of Hiphop Beef

The Stories are true; the names and places have been changed to protect the potentially guilty. It was almost closing time on Friday and my thoughts were turning to Barbequeing some of that mouth-watering Santa Maria tri-tip while my nose was turned to the scent of...

Email as a signed contract vs. fraudulent emails

Email as a signed contract vs. fraudulent emails We all send and receive email, but did you know that what you say in an email can be interpreted as a legal contract? And that sometimes, emails are fraudulent? Both are true. The Statute of Frauds Although email didn’t...

El Salvador Adopts BitCoin

El Salvador Adopts BitCoin copyright Steve Burgess, 2021 El Salvador just passed a law to make BitCoin (BTC) legal tender and is the first country to do so. It did something similar back in 2001, when it made the US Dollar the official currency, replacing the...

Keeping Your Bitcoin Safe

BitCoin. Everybody wants some. But what’s the best way to keep it safe once you’ve got it? And how to get it? First things first – you get BitCoin (and Etherium, and DogeCoin) from a cryptocurrency exchange, like you would from a “regular” currency exchange to turn...

Cyberbullying and Covid-19: 2021 Update

California defines a cyberbully as anyone who sends any online communication to deliberately frighten, embarrass, harass, or otherwise target another. The Cyberbullying Research Center defines it as “willful and repeated harm inflicted through the use of computers,...

Cybersecurity & Covid-19: Vulnerability and What to Do About It

Cybersecurity & Covid-19: Vulnerability and What to Do About It Steve Burgess, 2020 As if we didn’t have enough to worry about. With so many of us working from home (close to 90% of American corporations are encouraging or requiring employees to do so) and having...

Indian Summer Lovin’ – Tech Tips For a Warm Autumn

by Natalie Miller, 2019 With Indian Summer temperatures rising, here are some tips to help you make sure your devices are ready to conquer these warm days of Fall like you are. Check Those Pockets! Taking a dip in the pool, going for a paddle in a kayak, and jumping...

Pin It on Pinterest

Share This